Sciweavers

1005 search results - page 93 / 201
» Software Localization: Issues and Methods
Sort
View
116
Voted
RE
2002
Springer
15 years 2 months ago
Effective Communication in Requirements Elicitation: A Comparison of Methodologies
The elicitation or communication of user requirements comprises an early and critical but highly error-prone stage in system development. Socially-oriented methodologies provide m...
Jane Coughlan, Robert D. Macredie
99
Voted
ICIP
2009
IEEE
16 years 3 months ago
Boosting Object Retrieval By Estimating Pseudo-objects
State-of-the-art object retrieval systems are mostly based on the bag-of-visual-words representation which encodes local appearance information of an image in a feature vector. A ...
131
Voted
IJCNN
2007
IEEE
15 years 9 months ago
DHP-Based Wide-Area Coordinating Control of a Power System with a Large Wind Farm and Multiple FACTS Devices
—Wide-area coordinating control is becoming an important issue and a challenging problem in the power industry. This paper proposes a novel optimal wide-area monitor and wide-are...
Wei Qiao, Ronald G. Harley, Ganesh K. Venayagamoor...
261
Voted
JMLR
2012
13 years 5 months ago
Approximate Inference in Additive Factorial HMMs with Application to Energy Disaggregation
This paper considers additive factorial hidden Markov models, an extension to HMMs where the state factors into multiple independent chains, and the output is an additive function...
J. Zico Kolter, Tommi Jaakkola
127
Voted
SEDE
2010
15 years 14 days ago
Security Controls Applied to Web Service Architectures
Security certification assesses the security posture of a software system to verify its compliance with diverse, pre-specified security controls identified by guidelines from NIST...
Robert Baird, Rose F. Gamble